在线看一区二区,国产精品 久久久久久久,夜夜久久av,重口味一区二区

當前位置: > 學術(shù)報告 > 文科 > 正文

文科

Post-compromise security

發(fā)布時間:2018-05-30 瀏覽:

報告人:于江山,澳大利亞莫納什大學助理教授、博士生導師

報告日期:201861

報告時間:14:30-16:00  

報告地點:文津樓3628報告廳

報告摘要:

The security of cryptosystems relies on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. Attackers can (and they do in practice) make use of them to break the security of systems. This talk presents our research on how to mitigate cryptographic secret key compromise in two different cases. The first case considers compromised certificate authorities in public key infrastructure (PKI). We propose a new system, called Distributed and Transparent Key Infrastructure (DTKI), based on Google's Certificate Transparency project. DTKI is the first web PKI that is secure even if all service providers are compromised. The second case considers the key compromise in secure communication. We propose a multi-device messaging protocol, called DECIM, to allow users to detect the compromise of their device keys. A beta version of DECIM is integrated with an end-to-end secure email solution (as an adds-on of Thunderbird), and is OpenPGP compatible. Both systems use public ledgers to provide transparency, and the systems are co-designed with formal models. We verify their core security properties using the Tamarin Prover.

報告人簡介:

Jiangshan Yu will be a lecturer at Monash University from this September. Currently, he is a research fellow working with Prof. Paulo Esteves-Verissimo at SnT, University of Luxembourg (LU), and an honorary research fellow working with Prof. Mark Ryan in the University of Birmingham (UK). He is also a director of a University of Birmingham spin-out company. Previously, he obtained his PhD degree from the University of Birmingham, UK, and his MPhil and MSc. degree from University of Wollongong, Australia. He has broad research interests in computer security and cryptography, and has worked on topics such as cryptographic key management, blockchain consensus, and ledger-based applications. His research impact includes patent-pending ledger-based applications that have been covered by more than 40 international news medias including ACM TechNews, ScienceDaily, and SiliconRepublic, and have been developed by a University of Birmingham spin-out company. He has also co-designed a security solution on cryptographic key management for Huawei Ltd to manage their next generation network devices securely. He has been awarded the 'Chinese Government Award for Outstanding scholar abroad', the success rate is 3% in UK and 1% worldwide.

 

亚洲成人黄色网址入口在线观看视频 | 手机不卡AV在线播放| 日本大胸性视频| 日韩伦理片中文字幕中文| 国产精品亚洲精品欧美综合| 玖玖中文字幕在线| 首页123草逼网| 搡老熟女老女人一区二区| 无码人妻视频9区| 成人综合资源视频在线| 日韩国产人妻少妇午夜精品网站| 亚洲直播男女性生活黄色片| 欧美久久一二区| aaa.444五十六十路毛片| 亚洲欧美日韩综合一区二| 亚洲日韩打炮图| 久久亚洲高潮免费视频| 天天射色天天久久| 久久精品人妻青青河边草| 一级A级高清无码网站免| 亚洲日韩美一区| 白丝喷白浆一区二区在线观看| 女女国产高潮网站| 日韩美久久海量一区 二区| 综合久久精品网址| 好看的国产精品自拍视频| 欧美日专区一本道| 欧美日韩一道本一二三区| 欧美另类国产在线| 啊啊嗯嗯哦哦不要好大在线视频| 插的逼视频。| 亚洲 成人 欧洲| 亚洲综合插逼网| 欧美日韩乱论在线观看| 91 1区 2区 3区 欧美| 亚洲成人超碰| 19国际精品19久久久久| 久久逼资源| 91国产成人精品网站视频| 99久久亚洲欧美综合精品| 久艹天天干视频在线观看|